The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
INSTRUCTIONS 1. NUMBER OF QUESTIONS 25 2. HAS A TIME LIMIT OF 15 MINUTES 3. HAS A PASS MARKS OF 30% 4. QUESTIONS PER PAGE 1 5. EACH QUESTIONS HAS 1 MARKS 6. NEGATIVE MARKING FOR EACH QUESTIONS 0.25 7. WILL ALLOW TO YOU GO BACK ,SKIP AND CHANGE YOUR ANSWERS 8. WILL ALLOW TO YOU PRINT OUT YOUR RESULT AND CERTIFICATE 9. WILL ALLOW TO YOU PRINT OUT YOURS RESPONSE SHEET WITH CORRECT ANSWER KEY AND EXPLANATION 10. WE WILL PROVIDE YOURS RESULT,CERTIFICATE AND YOUR RESPONSE SHEET TO YOURS EMAIL ID AT END OF ONLINE TEST
. . . .
Questions and Answers
1.
What is the use of Bridge in Network ?
A.
to connect LANs
B.
to separate LANs
C.
to control Network Speed
D.
all of these
Correct Answer
A. to connect LANs
Explanation A bridge in a network is used to connect LANs. It acts as a link between different local area networks, allowing them to communicate and share resources. By connecting LANs, a bridge helps in expanding the network coverage and improving connectivity between devices in different LANs. This enables efficient data transmission and facilitates the sharing of files, printers, and other network resources. Therefore, the use of a bridge in a network is to connect LANs.
Rate this question:
2.
Router operates in which layer of OSI Reference Model?
A.
Layer 1
B.
Layer 3
C.
Layer 4
D.
Layer 7
Correct Answer
B. Layer 3
Explanation Routers operate in Layer 3 of the OSI Reference Model, which is the Network layer. This layer is responsible for routing and forwarding data packets between different networks. Routers make decisions based on IP addresses to determine the best path for data transmission. They use routing tables and protocols to determine the next hop for each packet, ensuring efficient and reliable communication between networks.
Rate this question:
3.
Each IP packet must contain
A.
Only source address
B.
Only Destination address
C.
Source and Destination address
D.
Source or Destination address
Correct Answer
C. Source and Destination address
Explanation Each IP packet must contain both the source and destination address. The source address indicates the sender of the packet, while the destination address indicates the intended recipient. These addresses are necessary for the proper routing and delivery of the packet across the network. Without both addresses, the packet would not be able to reach its intended destination.
Rate this question:
4.
Bridge works in which layer of the OSI model
A.
Application layer
B.
Transport layer
C.
Network layer
D.
Data link layer
Correct Answer
D. Data link layer
Explanation The correct answer is Data link layer. The data link layer is the second layer of the OSI model and is responsible for the reliable transfer of data between two adjacent nodes on a network. It provides error detection and correction, as well as flow control and sequencing of frames. Bridges operate at this layer as they connect two local area networks (LANs) and forward data packets between them based on their physical addresses.
Rate this question:
5.
Which provides a connetion-oriented reliable service of sending messages
A.
TCP
B.
IP
C.
UDP
D.
all of these
Correct Answer
A. TCP
Explanation TCP (Transmission Control Protocol) provides a connection-oriented reliable service of sending messages. It ensures that the data sent over the network is received accurately and in the correct order. TCP establishes a connection between the sender and receiver, breaks the data into packets, and reassembles them at the destination. It also includes mechanisms for error detection, flow control, and congestion control. TCP is widely used for applications that require reliable and ordered delivery of data, such as web browsing, file transfer, and email.
Rate this question:
6.
Which layers of OSI model are host-to-host layers?
A.
Transport,Session,Presentation,Application
B.
Network,Transport,Session,Presentation
C.
Data link,Network,Transport,Session
D.
Physical,Data link,Network,Transport
Correct Answer
A. Transport,Session,Presentation,Application
Explanation The host-to-host layers of the OSI model are responsible for establishing and maintaining communication between two end systems. These layers include the Transport layer, which ensures reliable delivery of data between hosts; the Session layer, which manages the session between hosts; the Presentation layer, which handles data formatting and encryption; and the Application layer, which provides network services to applications. These layers work together to enable end-to-end communication between hosts.
Rate this question:
7.
Which of the following IP address class is Mulitcast
A.
Class A
B.
Class B
C.
Class C
D.
Class D
Correct Answer
D. Class D
Explanation Class D IP addresses are reserved for multicast addresses. Multicast is a communication method where a single packet can be sent to multiple destinations simultaneously. It is commonly used for streaming media, online gaming, and other applications where multiple recipients need to receive the same data. Class D addresses range from 224.0.0.0 to 239.255.255.255.
Rate this question:
8.
The last address of IP address represents
A.
Unicast address
B.
Network address
C.
Broadcast address
D.
none of these
Correct Answer
C. Broadcast address
Explanation The last address of an IP address represents the broadcast address. The broadcast address is used to send a message to all devices on a network. When a device sends a message to the broadcast address, it is received by all devices on the network. This is useful for sending information that needs to be received by all devices, such as network announcements or updates.
Rate this question:
9.
How many bits are there in the Ethernet address
A.
64 bits
B.
48 bits
C.
32 bits
D.
16 bits
Correct Answer
B. 48 bits
Explanation The Ethernet address, also known as the MAC address, is a unique identifier assigned to network interfaces. It consists of 48 bits, which are typically represented as 12 hexadecimal digits separated by colons or hyphens. This address is used to identify devices on an Ethernet network and is essential for communication between devices.
Rate this question:
10.
How many layers are in the TCP/IP model
A.
4 layers
B.
5 layers
C.
6 layers
D.
7 layers
Correct Answer
A. 4 layers
Explanation The TCP/IP model consists of four layers: the network interface layer, the internet layer, the transport layer, and the application layer. Each layer is responsible for specific functions in the communication process. The network interface layer handles the physical connection between devices, the internet layer deals with addressing and routing packets across networks, the transport layer ensures reliable data delivery between hosts, and the application layer supports various applications and services. Therefore, the correct answer is 4 layers.
Rate this question:
11.
Which of the following layer of OSI model also called end-to -end layer?
A.
Presentation layer
B.
Network layer
C.
Session layer
D.
Transport layer
Correct Answer
D. Transport layer
Explanation The transport layer of the OSI model is also known as the end-to-end layer because it is responsible for the end-to-end delivery of data between the source and destination. It ensures that the data is delivered reliably and in the correct order by establishing a connection, breaking the data into smaller packets, and reassembling them at the destination. It also handles error detection and correction, flow control, and congestion control to optimize the transmission of data.
Rate this question:
12.
What is the benefit of the Networking?
A.
File sharing
B.
Easier access to resources
C.
Easier Backups
D.
All of these
Correct Answer
D. All of these
Explanation Networking provides several benefits, including file sharing, easier access to resources, and easier backups. File sharing allows users to easily exchange files and collaborate on projects. Easier access to resources means that users can access shared files, printers, and other devices from any location within the network. Networking also facilitates easier backups by allowing centralized backup systems to be implemented, ensuring that important data is protected and easily recoverable. Therefore, the correct answer is "all of these."
Rate this question:
13.
Which of the following is not in the Networking Devices
A.
Gateways
B.
Linux
C.
Routers
D.
Firewalls
Correct Answer
B. Linux
Explanation Linux is an operating system and not a networking device. It is a popular open-source operating system that can be used on various devices, including networking devices, but it itself is not a networking device. Gateways, routers, and firewalls are all examples of networking devices that are used to facilitate communication and network connectivity.
Rate this question:
14.
What is the size of MAC Address ?
A.
16-bits
B.
32-bits
C.
48-bits
D.
64-bits
Correct Answer
C. 48-bits
Explanation A MAC address is a unique identifier assigned to network interfaces for communications on a network. It is usually represented as a series of six groups of two hexadecimal digits, totaling 48 bits. Therefore, the correct answer is 48-bits.
Rate this question:
15.
Which of the following can be software?
A.
Routers
B.
Firewalls
C.
Gateways
D.
Modems
Correct Answer
B. Firewalls
Explanation Firewalls can be considered software because they are designed to monitor and control incoming and outgoing network traffic based on predetermined security rules. They are typically installed on computer systems and act as a barrier between a trusted internal network and an untrusted external network, preventing unauthorized access and protecting against potential threats. Firewalls can be implemented as software programs running on operating systems or as dedicated hardware devices, making them a valid option for the given question.
Rate this question:
16.
What is the use of Ping command?
A.
To test a device on the network is reachable
B.
To test a hard disk fault
C.
To test a bug in a application
D.
to test a printer quality
Correct Answer
A. To test a device on the network is reachable
Explanation The Ping command is used to test the reachability of a device on a network. It sends a small packet of data to the specified device and waits for a response. If the device responds, it indicates that the device is reachable and functioning properly. This command is commonly used by network administrators to troubleshoot network connectivity issues and check if a device is online or not.
Rate this question:
17.
MAC Address is the example of
A.
Transport Layer
B.
Data link layer
C.
application layer
D.
Physical layer
Correct Answer
B. Data link layer
Explanation A MAC address is a unique identifier assigned to a network interface card (NIC) by the manufacturer. It operates at the data link layer of the OSI model, which is responsible for the reliable transfer of data between directly connected devices on a network. The data link layer is responsible for framing data into frames, error detection and correction, and controlling access to the physical medium. Therefore, a MAC address is an example of a data link layer concept.
Rate this question:
18.
Routing table of a router keeps track of
A.
MAC address assignments
B.
port assignments to network devices
C.
Distribute IP address to network devices
D.
Routes to use for forwarding data to its destination
Correct Answer
D. Routes to use for forwarding data to its destination
Explanation The routing table of a router is used to keep track of the routes that the router can use to forward data to its destination. It contains information about the network addresses and the corresponding next hop or interface that the router should use to reach each destination. By consulting the routing table, the router can determine the most appropriate route for forwarding data packets based on factors such as network topology, link costs, and routing protocols.
Rate this question:
19.
Layer-2 switch is also called
A.
Multiport Hub
B.
Multiport Switch
C.
Multiport Bridge
D.
Miultiport NIC
Correct Answer
C. Multiport Bridge
Explanation A Layer-2 switch is also called a multiport bridge because it operates at the data link layer (Layer 2) of the OSI model. Like a bridge, it forwards data packets between different network segments based on the MAC addresses of the devices connected to it. It has multiple ports to connect different devices and can make forwarding decisions based on the destination MAC address in the Ethernet frames. Therefore, the term "multiport bridge" accurately describes the functionality of a Layer-2 switch.
Rate this question:
20.
The meanig of Straight-through Cable is-
A.
Four pairs connect to the same pin on each end
B.
The cable which Directly connects computer to computer
C.
Four wire pairs not twisted with each other
D.
The cable which is not twisted
Correct Answer
A. Four pairs connect to the same pin on each end
Explanation The correct answer is "Four pairs connect to the same pin on each end." This means that all four pairs of wires in the cable are connected to the same pin on both ends of the cable. This type of cable is commonly used for Ethernet connections, where each pair of wires carries a different signal. By connecting all four pairs to the same pin, the cable allows for faster and more efficient data transmission.
Rate this question:
21.
What is the maximum header size of an IP packet
A.
32 bytes
B.
64 bytes
C.
30bytes
D.
60 bytes
Correct Answer
D. 60 bytes
Explanation The maximum header size of an IP packet is 60 bytes. The IP header contains important information such as source and destination IP addresses, protocol version, packet length, and other control information. This header is necessary for routing and delivering the packet to its intended destination. A larger header size would consume more bandwidth and processing power, so it is important to keep it as small as possible while still accommodating all the necessary information.
Rate this question:
22.
What is the size of Host bits in Class B of IP address?
A.
4
B.
8
C.
16
D.
32
Correct Answer
C. 16
Explanation In Class B of IP address, the size of Host bits is 16. Class B addresses have a network portion of 16 bits and a host portion of 16 bits. This means that the first 16 bits of the IP address are used to identify the network, while the remaining 16 bits are used to identify the host within that network.
Rate this question:
23.
Which of the following is/are Protocols of Application?
A.
FTP
B.
DNS
C.
Telnet
D.
All of above
all of these
Correct Answer
D. All of above
all of these
Explanation The correct answer is "All of above" because FTP, DNS, and Telnet are all protocols of application. FTP (File Transfer Protocol) is used for transferring files between a client and a server over a network. DNS (Domain Name System) is responsible for translating domain names into IP addresses. Telnet is a protocol that allows remote login to a computer over a network.
Rate this question:
24.
Which of the following protocol is/are defined in Transport layer
A.
FTP
B.
TCP
C.
UDP
D.
Both UDP &TCP
Correct Answer
D. Both UDP &TCP
Explanation Both UDP and TCP are protocols that are defined in the Transport layer of the OSI model. UDP (User Datagram Protocol) is a connectionless protocol that provides a simple and lightweight method of delivering data packets. It does not guarantee the delivery or order of packets. TCP (Transmission Control Protocol), on the other hand, is a connection-oriented protocol that ensures reliable and ordered delivery of data packets. It establishes a connection between the sender and receiver before transferring data. Both protocols play a crucial role in facilitating communication between devices over a network.
Rate this question:
25.
ADSL is the abbreviation of
A.
Asymmetric Dual Subscriber line
B.
Asymmetric Digital system Line
C.
Asymmetric Dual system Line
D.
Asymmetric Digital Subscriber Line
Correct Answer
D. Asymmetric Digital Subscriber Line
Explanation ADSL stands for Asymmetric Digital Subscriber Line. This technology allows for high-speed data transmission over existing telephone lines. The term "asymmetric" refers to the fact that the upload and download speeds are not equal. In ADSL, the download speed is typically faster than the upload speed. This makes it ideal for activities such as web browsing, streaming, and downloading large files. The other options, Asymmetric Dual Subscriber Line, Asymmetric Digital system Line, and Asymmetric Dual system Line, are not the correct abbreviations for ADSL.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.